WhatsApp, the most popular messaging application in the world, has been found vulnerable to multiple security vulnerabilities that could allow malicious users to intercept and modify the content of messages sent in both private as well as group conversations. Discovered by security researchers at Israeli security firm Check Point, the flaws take advantage of a

Let’s get the fish in the barrel out of the way. Voatz are a tech startup whose bright idea was to disrupt democracy by having people vote on their phone, and store the votes on, you guessed it, a blockchain. Does this sound like a bad idea? Welp. It turned out that they seemed awfully

Bouncy Castle is a collection of cryptographic APIs for Java and C#, but it was recently reported that some of… the Bouncy Castle keystore files are vulnerable to hash collisions, which enable attackers to use brute force attacks to crack the cryptography behind C# and Java applications. How is this possible? What solutions has Bouncy

Twitter may have suspended the Proud Boys and their controversial leader Gavin McInnes, but it was never their platform of choice. The Proud Boys, a self described “Western chauvinist” organization that often flirts with more hard-line groups of the far right, runs an elaborate network of recruiting pages on Facebook to attract and initiate members.

DEFCON has hit back at criticisms levied at it by the National Association of Secretaries of State (NASS) over the introduction of an area designed to test voting machines. In a statement released on 9th August, the NASS said that while it applauded “the goal of DEFCON attendees to find and report vulnerabilities in election systems” it

by Paul Ducklin Here’s a cool fact: Macs run Unix. OK, in some ways that’s only very loosely true, when you think of all the non-Unixy stuff on top of the Darwin base layer, and we welcome your comments below to explain just how carelessly loose we have been… …but Macs are Unix computers – in

Fore! That’s not a ball hitting the 9th hole, that’s a ransomware attack. You heard correctly – the PGA (Professional Golfers’ Association) was hit with a ransomware attack this week, just days ahead of its annual championship tournament. Specifically, the attack was on the PGA’s computer servers, and is keeping officials from accessing files, such

All good things come to an end, and we’re rounding off our series of interviews to mark the 27th anniversary since computer scientist Tim Berners-Lee publicly announced the World Wide Web project In the last in our series of articles focusing on 27 years of the World Wide Web, we’re joined by ESET’s Distinguished Researcher

Artificial Intelligence (AI) has been seen as a potential solution for automatically detecting and combating malware, and stop cyber attacks before they affect any organization. However, the same technology can also be weaponized by threat actors to power a new generation of malware that can evade even the best cyber-security defenses and infects a computer

With the growth in cross-border payment services and ‘challenger’ bank cards for consumers, you’d be forgiven for wondering where the options are for small business — where cash is particularly precious. They do exist. One of the newer options is Neat, which is nested in Hong Kong but open for business worldwide. The startup started off

If you’re looking for hints that Apple might deliver on its long-rumored plan to develop its own car, a significant one landed this week after it emerged that Doug Field — Apple’s former VP of Mac hardware engineering — has rejoined from the company after a spell with Tesla. John Gruber at Daring Fireball broke

Thank you for joining! Access your Pro+ Content below. June 2016 How to find the best next-generation firewall Share this item with your network: Next-generation firewalls are integrated, hardware- or software-based, network security tools designed to detect and block sophisticated attacks. The NGFWs available on the market today can vary significantly from one another in

The Chinese hacking community operates by-and-large out in the open, using code words to avoid government scrutiny and benefitting from state support when attacks are aimed outside the country, according to a new report. While most news analysis of Chinese cyber-attacks focuses on state-sponsored campaigns, there is in fact a thriving and fast-maturing domestic cybercrime

by Maria Varmazis Is your company running G Suite? If so, from August you’ll have the option to enable alerts if Google suspects government-backed hacking attempts on any of your accounts. Since 2012, Google has been alerting individual Google account users if they suspect their account has been targeted by government-backed attackers using any number of

This research is a joint effort by Jay Rosenberg, senior security researcher at Intezer, and Christiaan Beek, lead scientist and senior principal engineer at McAfee. Intezer has also posted this story. Attacks from the online groups Lazarus, Silent Chollima, Group 123, Hidden Cobra, DarkSeoul, Blockbuster, Operation Troy, and 10 Days of Rain are believed to

The golf association is said to have had little success with restoring access to its files so far Attackers have breached the computer networks of the Professional Golfers’ Association (PGA) of America, locking its officials out of important files related to the PGA Championship that has just kicked off in St. Louis, Missouri, according to

Security researchers at Trustwave have released a new open-source tool that uses facial recognition technology to locate targets across numerous social media networks on a large scale. Dubbed Social Mapper, the facial recognition tool automatically searches for targets across eight social media platforms, including—Facebook, Instagram, Twitter, LinkedIn, Google+, the Russian social networking site VKontakte, and

Walmart sold its China-based e-commerce business in 2016, but the U.S. retail giant is very much involved in the Chinese internet market through a partnership with e-commerce firm JD.com. Alibaba’s most serious rival, JD scooped up Walmart’s Yihaodian business and offered its own online retail platform to help enable Walmart to products in China, both on

At Disrupt SF 2018, Facebook’s soon-to-be-former chief security officer Alex Stamos will join us to chat about his tenure in the top security role for the world’s biggest social network, how it feels to have weathered some of the biggest security and privacy scandals to ever hit the tech industry and securing U.S. elections in

At RSA Conference 2018, a Kaspersky Lab researcher showed how software development kits for popular ad networks… can cause data leaks in many mobile apps. What type of user data is being exposed, and how are the SDKs causing these leaks? Companies building mobile applications, like any modern software application, use third-party libraries and software

One in 13 UK cybersecurity professionals have admitted they also participate in black hat activities, according to new research from Malwarebytes. The security vendor commissioned Osterman Research to poll 900 professionals in the US, UK Germany, Australia and Singapore to compile its latest study, White Hat, Black Hat and the Emergence of the Gray Hat:

by Lisa Vaas Here’s what the Wall Street Journal reported on Monday: Facebook has asked big banks to share their customers’ personal financial data, including card transactions and checking-account balances. And here, basically, was the response from anybody who’s ever heard of Cambridge Analytica: Hysterical laughter with a bit of “Oh, hell NO. We should

Our routers are our connection to the internet, allowing us to use our devices to access websites at our leisure. And because of this, routers are often a target for hackers. In fact, just this week, it was uncovered that MikroTik is the latest router manufacturer under siege, as researchers have discovered a massive Coinhive

The slew of vulnerabilities – since patched – were found without the use of automated testing tools A team of seven researchers has discovered more than 20 security vulnerabilities in OpenEMR, an open-source application used worldwide for the electronic management of the medical records of almost 100 million people. In keeping with the principles of

The source code of the popular social media app Snapchat was recently surfaced online after a hacker leaked and posted it on the Microsoft-owned code repository GitHub. A GitHub account under the name Khaled Alshehri with the handle i5xx, who claimed to be from Pakistan, created a GitHub repository called Source-Snapchat with a description “Source

Amazon today is continuing to make good on its Whole Foods acquisition by introducing a new grocery pickup service at select Whole Foods locations in the U.S. The service, which is available only to Prime members, will initially be available at stores in Sacramento and Virginia Beach, but will expand to more cities through the

One of the crucial underlying protocols of the global internet — and many other networks today — is the Border… Gateway Protocol. Now in version 4, BGP provides reachability and loop-free paths for just about every corner of the world in computer networking terms — from data centers and software-defined WANs to the fabrics of

The vast majority of IT decision makers appear to believe the hype surrounding artificial intelligence as a means to enhance cybersecurity. An ESET poll of 900 IT leaders in the US, UK and Germany found a disappointing 75% believe AI is a ‘silver bullet’ to helping them counter online threats. Respondents from the US (82%)

by Mark Stockley For two and a half years someone has been terrorising organisations by breaking in to their networks and infecting their computers with devastating, file-encrypting malware known as SamSam. The attacks are regular, but rarer and more sophisticated than typical ransomware attacks, and the perpetrators extort eye-watering, five-figure ransoms to undo the damage they

We’ve all heard it – a smoke detector that goes off with only the slightest of prompts. Light a candle and listen to it go off. Cook (or overcook) a meal, and the beeping sends you running to make sure there isn’t a fire. You of course know that a lit candle and sizzling food